albertogscotti's Stars
h33tlit/secret-regex-list
List of regex for scraping secret API keys and juicy information.
cudeso/CSIRT-Jump-Bag
CSIRT Jump Bag
airbus-seclab/bincat
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
withdk/pulse-gosecure-rce-poc
Tool to test for existence of CVE-2020-8218
hasherezade/malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
megadose/holehe
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
ScoopInstaller/Main
📦 The default bucket for Scoop.
Neo23x0/Raccine
A Simple Ransomware Vaccine
rosehgal/HoneySMB
Simple High Interaction Honeypot Solution for SMB protocol
SecurityRiskAdvisors/VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
fanthore/F4-220
All info about hacking a TerraMaster F4-220 to run OpenMediaVault
alexandreborges/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
haad/proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
jgraph/drawio-desktop
Official electron build of draw.io
DavidXanatos/wumgr
Windows update managemetn tool for windows 10
lgandx/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
borgmatic-collective/borgmatic
Simple, configuration-driven backup software for servers and workstations
yeti-platform/yeti
Your Everyday Threat Intelligence
Ciphey/Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
silence-is-best/c2db
c2 traffic
DidierStevens/DidierStevensSuite
Please no pull requests for this repository. Thanks!
asciimoo/wuzz
Interactive cli tool for HTTP inspection
tomchop/malcom
Malcom - Malware Communications Analyzer
lachesis/scallion
GPU-based Onion Hash generator
intelowlproject/IntelOwl
IntelOwl: manage your Threat Intelligence at scale
CERT-Polska/drakvuf-sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
kacos2000/WindowsTimeline
Windows 10 (v1803+) ActivitiesCache.db parsers (SQLite, PowerShell, .EXE)
cyberark/SkyArk
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
eprigorodov/mkosxinstallusb
Linux shell script that creates USB flash drive booting OS X installer